dc.contributor.author |
Burke, Ivan D
|
|
dc.contributor.author |
Herbert, A
|
|
dc.contributor.author |
Mooi, Roderick D
|
|
dc.date.accessioned |
2019-02-06T12:52:21Z |
|
dc.date.available |
2019-02-06T12:52:21Z |
|
dc.date.issued |
2018-09 |
|
dc.identifier.citation |
Burke, I.D., Herbert, A. and Mooi, R.D. 2018. Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN. Annual conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2018), Port Elizabeth, 26-28 September 2018, pp. 164-170 |
en_US |
dc.identifier.isbn |
978-1-4503-6647-2/18/09 |
|
dc.identifier.uri |
https://dl.acm.org/citation.cfm?doid=3278681.3278701
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/10682
|
|
dc.description |
Copyright: 2018 ACM. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website: https://dl.acm.org/citation.cfm?doid=3278681.3278701 |
en_US |
dc.description.abstract |
Distributed Denial of Service (DDoS) attacks cause significant disruption on critical networks within South Africa. Timely detection and mitigation is a key concern for the SANReN Cyber Security Incident Response Team (CSIRT). This paper presents an analysis on the Memcached reflection DDoS attack which occurred in February 2018. The attack was the largest DDoS attack to date. By analysing the attack and the impact it had on the SANReN network, this paper aims to show how network flow data can be used to detect network attacks, and perform post attack analysis to prevent future network attacks. The attack time-line is divided into three main phases: pre-attack, peek attack period and post attack residue. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Association for Computing Machinery |
en_US |
dc.relation.ispartofseries |
Worklist;21812 |
|
dc.subject |
Network attack analysis |
en_US |
dc.subject |
Network monitoring |
en_US |
dc.subject |
National Infrastructure |
en_US |
dc.title |
Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Burke, I. D., Herbert, A., & Mooi, R. D. (2018). Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN. Association for Computing Machinery. http://hdl.handle.net/10204/10682 |
en_ZA |
dc.identifier.chicagocitation |
Burke, Ivan D, A Herbert, and Roderick D Mooi. "Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN." (2018): http://hdl.handle.net/10204/10682 |
en_ZA |
dc.identifier.vancouvercitation |
Burke ID, Herbert A, Mooi RD, Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN; Association for Computing Machinery; 2018. http://hdl.handle.net/10204/10682 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Burke, Ivan D
AU - Herbert, A
AU - Mooi, Roderick D
AB - Distributed Denial of Service (DDoS) attacks cause significant disruption on critical networks within South Africa. Timely detection and mitigation is a key concern for the SANReN Cyber Security Incident Response Team (CSIRT). This paper presents an analysis on the Memcached reflection DDoS attack which occurred in February 2018. The attack was the largest DDoS attack to date. By analysing the attack and the impact it had on the SANReN network, this paper aims to show how network flow data can be used to detect network attacks, and perform post attack analysis to prevent future network attacks. The attack time-line is divided into three main phases: pre-attack, peek attack period and post attack residue.
DA - 2018-09
DB - ResearchSpace
DP - CSIR
KW - Network attack analysis
KW - Network monitoring
KW - National Infrastructure
LK - https://researchspace.csir.co.za
PY - 2018
SM - 978-1-4503-6647-2/18/09
T1 - Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN
TI - Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN
UR - http://hdl.handle.net/10204/10682
ER -
|
en_ZA |